Quantifying the Security Cost of Migrating Protocols to Practice

被引:0
|
作者
Patton, Christopher [1 ]
Shrimpton, Thomas [1 ]
机构
[1] Univ Florida, Florida Inst Cybersecur Res Comp & Informat Sci &, Gainesville, FL 32611 USA
来源
ADVANCES IN CRYPTOLOGY - CRYPTO 2020, PT I | 2020年 / 12170卷
关键词
Real-world cryptography; Protocol standards; Concrete security; Indifferentiability; KEY; INDIFFERENTIABILITY;
D O I
10.1007/978-3-030-56784-2_4
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We give a framework for relating the concrete security of a "reference" protocol (say, one appearing in an academic paper) to that of some derived, "real" protocol (say, appearing in a cryptographic standard). It is based on the indifferentiability framework of Maurer, Renner, and Holenstein (MRH), whose application has been exclusively focused upon non-interactive cryptographic primitives, e.g., hash functions and Feistel networks. Our extension of MRH is supported by a clearly defined execution model and two composition lemmata, all formalized in a modern pseudocode language. Together, these allow for precise statements about game-based security properties of cryptographic objects (interactive or not) at various levels of abstraction. As a real-world application, we design and prove tight security bounds for a potential TLS 1.3 extension that integrates the SPAKE2 password-authenticated key-exchange into the handshake.
引用
收藏
页码:94 / 124
页数:31
相关论文
共 50 条
  • [31] Timed analysis of security protocols
    Corin, R.
    Etalle, S.
    Hartel, P.
    Mader, A.
    JOURNAL OF COMPUTER SECURITY, 2007, 15 (06) : 619 - 645
  • [32] What is Correctness of Security Protocols?
    Bella, Giampaolo
    JOURNAL OF UNIVERSAL COMPUTER SCIENCE, 2008, 14 (12) : 2083 - 2106
  • [33] Compiling and verifying security protocols
    Jacquemard, F
    Rusinowitch, M
    Vigneron, L
    LOGIC FOR PROGRAMMING AND AUTOMATED REASONING, PROCEEDINGS, 2000, 1955 : 131 - 160
  • [34] Safely composing security protocols
    Cortier, Veronique
    Delaitre, Jeremie
    Delaune, Stephanie
    FSTTCS 2007: FOUNDATIONS OF SOFTWARE TECHNOLOGY AND THEORETICAL COMPUTER SCIENCE, PROCEEDINGS, 2007, 4855 : 352 - 363
  • [35] Automated Composition of Security Protocols
    Bela, Genge
    Ignat, Iosif
    Piroska, Haller
    2009 IEEE 5TH INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTER COMMUNICATION AND PROCESSING, PROCEEDINGS, 2009, : 251 - +
  • [36] Resiliency Aspects of Security Protocols
    Granado, Marcus C.
    SECURITY PROTOCOLS, 2010, 5964 : 37 - 57
  • [37] Network Security and Networking Protocols
    Sharma, Arvind Kumar
    Lamba, Chattar Singh
    RECENT TRENDS IN NETWORKS AND COMMUNICATIONS, 2010, 90 : 90 - 97
  • [38] Group Anonymity in Security Protocols
    Tiplea, Ferucio Laurentiu
    Varlan, Cosmin
    PROCEEDINGS OF THE 2018 FEDERATED CONFERENCE ON COMPUTER SCIENCE AND INFORMATION SYSTEMS (FEDCSIS), 2018, : 407 - 416
  • [39] DYNAMIC TAGS FOR SECURITY PROTOCOLS
    Arapinis, Myrto
    Delaune, Stephanie
    Kremer, Steve
    LOGICAL METHODS IN COMPUTER SCIENCE, 2014, 10 (02)
  • [40] Operational semantics of security protocols
    Cremers, C
    Mauw, S
    SCENARIOS: MODELS, TRANSFORMATIONS AND TOOLS, 2005, 3466 : 66 - 89